Please turn on your JavaScript for this page to function normally.
Undetected data breaches are the ones that hurt the most

File transfer technologies have been around for over 30 years, but recent evolutionary changes in business needs have resulted in significant improvements to file transfer …

Excalibur Conference 2010 call for papers

In autumn 2010, the Excalibur Conference in China, will feature talks but world-renowned security professionals that will address new areas of research. The event will cover …

Rogue software details: Desktop Security 2010

Desktop Security 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …

75% of organizations suffered a cyber attack

A new Symantec study found that 42 percent of organizations rate security their top issue. This isn’t a surprise, considering that 75 percent of organizations …

First 2TB 6Gb/s SAS enterprise drive

Seagate is now shipping its 3.5-inch Constellation ES drive, the industry’s first 2TB enterprise-class drives featuring 6Gb SAS. Designed specifically for multi-drive …

New PGP Key Management Server

PGP Corporation announced its new PGP Key Management Server, which delivers open enterprise key and certificate management to global organizations. Deployment and the need to …

Tin Hat: High security Linux

Tin Hat is a Linux distribution derived from hardened Gentoo which aims to provide a very secure, stable and fast Desktop environment that lives purely in RAM. Tin Hat boots …

Week in review: Data breaches, prison terms and cyber attacks

Here’s an overview of some of last week’s most interesting news, articles and videos: Security consultant turned hacker sentenced to 13 years in prison Max Ray …

The state of healthcare privacy in the U.S.

FairWarning commissioned a national survey of healthcare providers. The majority of survey respondents were compliance, privacy or risk personnel, followed by IT management …

Cloud Security Alliance and IEEE join forces

The Cloud Security Alliance (CSA) and IEEE are joining forces to ensure that best practices and standards are developed and available to provide security assurance for cloud …

Get Backup: Free Mac backup software

Important aspects of your life are stored within the data on your computer, the loss of which can turn into a nightmare. To protect yourself from hard drive crash or human …

Fuzzing: Build security in

The greatest security challenge today is discovering new vulnerabilities. Software release cycles are getting faster and new technologies are increasingly complex, a perfect …

Don't miss

Cybersecurity news